π» Web Application Security Learner | Red Team Trainee | Ethical Hacking Enthusiast
π Based in Accra, Ghana
π§ Documenting my journey into offensive security, one lab at a time
I'm focused on becoming highly skilled in Web Application Penetration Testing and Red Team operations.
I spend most of my time solving labs, building tools, and writing technical notes to deeply understand how real-world attacks work.
I believe in learning in public β so most of what I study gets turned into notes, repos, or writeups here.
- π Web Application Security (OWASP Top 10 and beyond)
- π§ͺ PortSwigger Web Security Academy labs
- π Authentication & Access Control vulnerabilities
- π£ SQL Injection, XSS, CSRF
- π§° Building and improving Python pentesting tools
- π§ Understanding how attacks work at a deeper level (not just payloads)
π§ͺ Pentest Labs Notes
Writeups and personal notes from security labs I solve.
Focused on understanding why vulnerabilities work, not just how to exploit them.
Custom tools I built while learning networking and MITM attacks:
- Packet Sniffer
- MAC Address Changer
- ARP Spoofer
- cnr multi-tool
- port_scanner
- subdomain_enum
- directory_fuzzer
- web_crawler
- xss_scanner
- sql_injection_tester
- js_endpoint_extractor
- idor_finder
- recon_automation
Refactoring them into clean CLI tools with proper documentation.
- PortSwigger Web Security Academy
- TryHackMe
- Real-world vulnerability research & writeups
- Master advanced web exploitation techniques
- Transition into professional Red Teaming
- Contribute tools, research, and writeups to the security community
- πΌ LinkedIn: https://www.linkedin.com/in/cybernerddd
- π GitHub: https://github.com/cybernerddd
βEvery expert hacker was once confused by their first SQL injection.β